Module 3 Flashcards

Information Hiding

1
Q

Information Encryption

A

Data is visible, but the content is scrambled and meaningless to those without the cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Hiding

A

The goal is to prevent others from knowing that hidden information even exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Steganography

A

The practice of hiding information within other non-suspicious data, such as an image or text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Watermarking

A

A method to mark a digital asset to demonstrate ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cover Media

A

The media that will hold the hidden data (e.g., image, network packets, executable files).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secret Message

A

The data that is hidden within the cover media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stego Function

A

The function responsible for embedding or hiding the secret message in the cover media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stego Object

A

The output of embedding a secret message into the cover media (i.e., cover media + secret message).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plaintext Steganography

A

Steganography using selected characters and positions in the cover media to hide a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Image Steganography

A

Using images to hide binary data as a secret message within an image file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least Significant Bit (LSB)

A

Hiding information in the least significant bits of pixels or audio samples in an image or audio file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discrete Cosine Transform (DCT)

A

Using the frequency components of images (as done in JPEG compression) to hide data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audio Steganography

A

Hiding information in an audio file, typically by replacing least significant bits of audio samples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Datagram Steganography

A

Using fields in datagrams (such as IP identification or TCP sequence numbers) to hide data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Watermarking

A

A watermark that can be read by anyone, often used to track illicit use of digital assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private Watermarking

A

A watermark that requires a secret key to access, used to verify ownership of digital assets.

17
Q

Magic Triangle of Data Hiding

A

A trade-off between capacity, imperceptibility, and robustness in data hiding techniques.

18
Q

Digital Watermarking

A

The process of marking a digital asset to prove ownership or to track its usage.